-
2081
Monotone-Iterative Method for Solving Antiperiodic Nonlinear Boundary Value Problems for Generalized Delay Difference Equations with Maxima
Published 2013-01-01“…An important feature of the given algorithm is that each successive approximation of the unknown solution is equal to the unique solution of an appropriately constructed initial value problem for a linear difference equation with “maxima,” and an algorithm for its explicit solving is given. …”
Get full text
Article -
2082
Challenges of International Trade and Government Governance from the Perspective of Economic Globalization
Published 2022-01-01“…On the basis of expounding the particle swarm optimization algorithm and GMDH algorithm, the optimization mode, method, and process of GMDH network based on particle swarm optimization are also expounded. …”
Get full text
Article -
2083
DBN-MACTraj: Dynamic Bayesian Networks for Predicting Combinations of Long-Term Trajectories with Likelihood for Multiple Agents
Published 2024-11-01“…DBN-MACTraj consists of two main components: a single-agent probabilistic model and a multi-agent risk-averse sampling algorithm. …”
Get full text
Article -
2084
On the Use of Singular Vectors for the Flexibility-Based Damage Detection under the Assumption of Unknown Structural Masses
Published 2018-01-01“…The main purpose of this work is to investigate the usability of easily obtainable parameters instead of the modal traditional ones, in the context of a flexibility-based damage detection procedure, under the assumption of unknown structural masses. …”
Get full text
Article -
2085
Improving security and stability of ad hoc on-demand distance vector with fuzzy neural network in vehicular ad hoc network
Published 2018-10-01“…The improved scheme extracts the main parameters that affect the security of the nodes. …”
Get full text
Article -
2086
The Importance of Rhythm Activity in Epilepsy EEG Signal Classification (An Educational Article)
Published 2024-08-01“…By extracting effective features from EEG data in both time and frequency domains, the k nearest neighbor (KNN) algorithm was used for the time and frequency domain. …”
Get full text
Article -
2087
Production machines maintenance based on digitalization
Published 2019-04-01“…It is based on the proposed algorithm for an autonomous control of the process state.Discussion and Conclusions. …”
Get full text
Article -
2088
Mutually Orthogonal Golay Complementary Sequences in Synthetic Aperture Imaging Systems
Published 2015-04-01“…The main objective of this study is to improve the ultrasound image by employing a new algorithm based on transducer array element beam pattern correction implemented in the synthetic transmit aperture (STA) method combined with emission of mutually orthogonal complementary Golay sequences. …”
Get full text
Article -
2089
Construction of Optimal Derivative-Free Techniques without Memory
Published 2012-01-01“…The novel algorithm could deal with nonlinear functions having finitely many zeros in an interval.…”
Get full text
Article -
2090
A three-dimensional reconstruction method of coal mine tunnel fused with LiDAR and IMU
Published 2025-02-01“…The overall distance degradation error is only 2.46%, which is 66.12%, 65.30% and 70.43% higher than that of the other three algorithms, respectively. Three-dimensional reconstruction experiments are carried out in the roadway excavation in the main laboratory of the coal mine. …”
Get full text
Article -
2091
Ontological approach in the practice of the educational activity: paths’ formation of individual professional development of students
Published 2018-11-01“…Practical application of the tools is illustrated by developing the “complementary” competences of a specific profile of education (“information management”) of the basic educational program (Bachelor in Management) of 2017 admission year in one of the leading Russian universities.Results. The main methodological result of the work is the suggested algorithm of “complementary” competences formation. …”
Get full text
Article -
2092
Numerical Solutions of the Gardner Equation via Trigonometric Quintic B-spline Collocation Method
Published 2018-12-01“…The main purpose of this paper is to get the numericalsolutions of the Gardner equation which are widely used in various disciplines.For this purpose, the time integration of the system is achieved by theclassical Crank-Nicolson method owing to its large stability region. …”
Get full text
Article -
2093
Methods of sampling repairs industry are outsourcing
Published 2017-08-01“…This article identifies the main factors affecting the cost of repairing the machines. …”
Get full text
Article -
2094
Simulation Analysis of RES System Optimization Strategy of Range-extended Electric Vehicle
Published 2015-01-01“…Based on the working modes of the transmission system of range-extended electric vehicle,the map of internal combustion engine and battery system characters are obtained through calculation,the main components of transmission are set up in Matlab on the basis of dynamics equation,and the model is analyzed,the genetic algorithm is combined into control strategy in order to optimize the start-close area of range extended system.The simulation results show that the optimized strategy can not only improve the fluctuation range of SOC,but also improve the fuel consumption of transmission system.…”
Get full text
Article -
2095
Adaptive Super-Twisting Sliding Mode Control of Permanent Magnet Synchronous Motor
Published 2021-01-01“…The work has developed an innovative speed loop controller for the permanent magnet synchronous motor (PMSM) system. The main advantage of the presented method lies in the fact that the boundary of the lumped disturbance is not required. …”
Get full text
Article -
2096
Research on Big Data Application for Security
Published 2015-07-01“…Several data sources of big data on security were described,a closer look was taken at the implementation of big data platform on security,the main points and steps during the implementation were also proposed.Specially,detail analysis on the overall architecture and system structure of the big data platform on security were provided,the relationship with the existing video surveillance platform was also described.The implementation of big data platform on security must be promoted on the scale of data characteristics and algorithm maturity.…”
Get full text
Article -
2097
CLUSTER POLICY SUPPORT BUSINESS DEVELOPMENT IN THE MAGADAN REGION
Published 2022-05-01“…The author developed and described in detail the algorithm of management actions on the implementation of program-target approach tailored to the particular conditions of the Magadan region. …”
Get full text
Article -
2098
Shock in pediatric infection diseases
Published 2019-07-01“…Shock is a frequent, lethally dangerous complication of infectious diseases in children. The main reason for high mortality among children population is late diagnostics and irrational therapy. …”
Get full text
Article -
2099
About the development of the diagnostic model for power transformers
Published 2017-12-01“…It reflects the structure and algorithm of diagnostic model. In article the main signs of damages for separate elements of power transformer are listed.…”
Get full text
Article -
2100
Orthogonal Components Forming of the Microprocessor-Based Protection Input Signals
Published 2020-08-01“…The use of orthogonal components (OS) is the main direction of determining information parameters in microprocessor relay protection and automation of electric power systems. …”
Get full text
Article